|Program Lock Pro - http://www.softdd.com/program-pc-lock-protect/index.htm|
Lock and unlock any program on your PC. You can choose your own message to display if anyone attempts to run one of your locked programs. Includes password protection so only you can unlock the program when you are ready to use it. Allows the entire PC to remain active and running, and it only locks and prevents access to the programs that you specify.
Keywords: Program Lock Pro; Internet; Security; System locking; Program Lock Pro
|1Lock - http://www.atma-software.com/1lock/|
Encrypt files for burning on a CD or for download, or add a serial number to your own setup program. The program supports multiple languages.
Keywords: 1Lock; System and utilities; Development; Installation tools; 1Lock
|Lock My PC - http://www.fspro.net/|
This program locks your computer when you leave it unattended. It shows a lock screen and disables Windows hotkeys and the mouse. You can lock your PC by hotkey combination or from the system tray. To unlock the computer you must enter the correct password. The program can log invalid password entry attempts and provides the option to keep your PC locked even if a power failure occurs or someone switches it off and on...
Keywords: Lock My PC; Internet; Security; System locking; Lock My PC
|Icon Lock-iT XP - http://www.moonvalley.com|
This program provides strong file encryption and password protection for Windows XP, 2000 and NT desktop files. Configurable user accounts enforce file ownership and let you decide who can lock files. The self-decrypting option lets you send or distribute encrypted files. When you choose to create a self-decrypting file, instead of locking your file or folder, Icon Lock-iT XP will transform it into a self-extracting executable...
Keywords: Icon Lock-iT XP; System and utilities; File tools; File encryption; Icon Lock-iT XP; Icon Lock iT XP
|G-Lock SpamCombat - http://www.glocksoft.com/sc/index.htm|
This spam filtering tool lets you remove spam e-mail from the mail server without downloading them to your inbox.
Keywords: G-Lock SpamCombat; Internet; E-mail and news; Anti-spam tools; G-Lock SpamCombat
|G-Lock EasyMail Professional - http://www.glocksoft.com/em/|
This program creates mass mailings with unique message content and subject lines. It supports voice mail and a range of compression formats. You can also set the recording to start playing when mail is opened. HTML and MIME messages are supported, so you can include formatted text, HTML, attached files and embedded objects.
Keywords: G-Lock EasyMail Professional; Internet; E-mail and news; E-mail clients; G-Lock EasyMail Professional
|Air EXE Lock - http://2peak.bluesaga.com/|
This program protects executable files from non-authorized execution using a password.
Keywords: Air EXE Lock; System and utilities; File tools; File encryption; Air EXE Lock
|CD-Lock - http://www.cd-lock.com/|
This program encrypts your files with Blowfish and optionally scrambles the file names. You don't have to decrypt the files before you use them. Just enter your password when the CD is inserted, and the information will be unscrambled. CD-Lock disks can be distributed to anyone and will work on any computer running Windows 2000 or XP. All the end user needs is the protected CD and the password.
Keywords: CD-Lock; System and utilities; File tools; File encryption; CD Lock
|E-Lock ProSigner - http://www.elock.com|
This desktop signature program integrates with MS-Word, Excel, Adobe Acrobat and the Windows environment. Wizards guide you through the signing and encryption process. You can sign and encrypt files in any format, using any x.509 digital certificate. You can also sign and encrypt through non-PKI, password-protected digital credentials. Features include certificate validation through CRL, OCSP and CAM, and the ability to associate handwritten signatures.
Keywords: E-Lock ProSigner; System and utilities; File tools; File encryption; E-Lock ProSigner
|instant Lock - http://instantlock.net|
This folder security software protects your private documents from unauthorized users. It can lock 100GB of data through a drag-and-drop operation. You can secure files and folders on both the NTFS and FAT/FAT32 drives, and all 32-bit Windows operating systems.
Keywords: instant Lock; System and utilities; File tools; File encryption; instant Lock
|Broadband Lock Internet Security - http://www.broadbandlock.com/|
This program protects your computer by disconnecting your PC from your broadband Internet connection when your mouse or keyboard has not been used for a specified amount of time. It can be reactivated using a a password, or by moving the mouse or keyboard. You can also connect and disconnect manually and set timed Internet session limits with SessionLock and use our PassLock password protection feature to completely control all access to the Internet.
Keywords: Broadband Lock Internet Security; Internet; Security; System locking; Broadband Lock Internet Security
|Lock Folder XP - http://www.everstrike.com/|
This security tool locks your files, folders and drives with a personal password. The program uses an encryption algorithm approved by the US Government. The program protects your sensitive data from unauthorized access, malicious programs, accidental damage and intentional harm. Just drag your file, folder or drive over to the program's window, and the rest is done automatically.
Keywords: Lock Folder XP; System and utilities; File tools; File encryption; lockfolder; lock folder
|Aquarius Soft PC Lock Up Professional - http://www.aquariussoft.com/pc-lock-up|
This PC access control and parental control software lets you control the usage hours of your PCs. With PC Lock Up, you can set up hourly lock up time slots that will display a customizable Lock Up Screen to stop people from continuing using the PC. You also have the option to let PC Lock Up automatically shut down the PC during lock up times to save power. A voice message can be set to alert the user of upcoming PC lock up so that they can save their work prior to lock up times...
Keywords: Aquarius Soft PC Lock Up Professional; System and utilities; Security; User management; Aquarius Soft PC Lock Up Professional
|G-Lock Email Processor - http://www.glocksoft.com/ep/|
This tool automatically parses incoming Internet e-mail, including bounced and undeliverable messages, and subscribe and unsubscribe requests. It can automatically extract data and perform other actions based on message content. Email Processor can work with multiple POP3 Internet mailboxes, filter incoming messages by different conditions, extract any data from the message body and header, and save extracted data to a file in a user-specified format...
Keywords: G-Lock Email Processor; Internet; E-mail and news; E-mail parsers; G Lock E-mail Processor
|Folder Lock - http://www.newsoftwares.net/folderlock|
This file security application can password-protect your personal files and folders. Locked files are not accessible to unauthorized users, and they cannot be deleted. Drag and drop any file or folder into its Locker folder for one-click locking. The program uses secure three-layer locking protection, and it does not load files at startup.
Keywords: Folder Lock; System and utilities; File tools; File encryption; FOLDER; LOCK; FOLDERLOCK; FILE; ENCRYPTION; FILES; SECURITY; PASSWORD; PASSWORDED; PROTECT; SECURE; PROTECTION; LOCKING; ENCRYPT
|inetLock - http://www.codesworth.com/codesworth/helpInetlock.htm|
This Internet utility and Explorer browser helper identifies all NICs on a PC, and locks and unlocks individual NICs. It can monitor and display up and down traffic rates, manage encrypted user IDs and passwords, shred files for permanent deletion, automate login processes, automate form-filling processes, and allow you to define personalized routes for Web surfing. A route is a sequence of Web sites and a set of actions to take on each...
Keywords: inetLock; Internet; Monitoring; All-in-one; inetlock; i-net lock; i-netlock
|DeviceLock - http://www.protect-me.com/dl/|
This program gives network administrators control over which users can access what devices on a local computer. Once DeviceLock is installed, administrators can control access to floppies, CD-ROMs, USB FireWire, WiFi or any other device, depending on the time of day and day of the week. It can protect network and local computers against viruses, Trojans and other malicious programs. Network administrators can also use DeviceLock to flush a storage device's buffers...
Keywords: DeviceLock; System and utilities; Security; User management; FLOPLOCK; CDLOCK; SECURENT; SECUREWAVE; devicelock; device lock
|ActiveScreenLock - http://www.dmvsoft.com|
This protects your computer from unauthorized access by adding a password-protected window that appears on top of all other windows. In order to remove it, a correct password needs to be entered. Key combinations Alt+F4, Ctrl+Alt+Del, Alt+Tab and WinKey are blocked. The program can also hide the mouse cursor, disable the task manager and run automatically.
Keywords: ActiveScreenLock; Multimedia; Themes editors and tools; Screen saver utilities; Active Screen Lock
|ClockWatch Sentry for Windows - http://www.beaglesoft.com/clwasentry.htm|
This clock program has a clock-locking feature that lets you lock down the date and time on any Windows computer. Whenever an unauthorized user tries to change the date or time, it blocks the change and logs the attempt.
Keywords: ClockWatch Sentry for Windows; Business; Management; Time and resource management; DATE; TIME; LOCK; CLOCK; ClockWatch Sentry for Windows; ClockWatch Sentry
|TogglesInTray - http://www.anibisoft.com/tit/|
At one time or another, each of us inadvertently presses the Caps Lock, Num Lock, or Insert key only to discover afterward that everything typed since is goofed up. This program helps prevent this issue by providing on-screen and audio reminders. System tray icons light up and an audio alert sounds whenever you press these keys. You can specify a WAV file or simply use your computer's standard alert tone...
Keywords: TogglesInTray; System and utilities; General tools; Mouse and keyboard; Keyboard; utility; Caps; Lock; Tray; toggle; key; insert; beep pc-speaker; insert key; beep; near clock
|Kryptel Encryption Suite - http://www.kryptel.com|
This drag-and-drop file encryption program provides secure data protection. The one-click solution can process any files or folders in a single operation. It includes a tool for creating encrypted backups and can be run in unattended batch mode. The package contains an integrated file shredder for secure deletion of sensitive data.
Keywords: Kryptel Encryption Suite; System and utilities; File tools; File encryption; COMPRESSION; DIRECTORY; HIPAA; SHREDDER; SHREDDING; DELETE; PROTECTOR; PASSWORDS; SECURITY; RECOVER; REPAIR; QUALITY; ULTIMATEZIP; INSTANT; PERSONAL; ANTISPY; INTRUSION; PROTECTED; LOCKER; LOCK; AES; DES; BLOWFISH; TWOFISH; SERPENT; CIPHER; ENCRYPTION; ENCRYPT; SECURE; ERASE; BACKUP; PASSWORD; ENCODER; FOLDER; FILE; FILES; FOLDERS; SOFTWARE; WINZIP; RECOVERY; TOOLS; CLEANER; ACCESS; COMPRESSOR; COMPRESS; TRUST; PROCESSING; APPLICATIONS; ARCHIVER; PRIVACY; DOWNLOAD; EXPLORER; FIREWALL; WINRAR; MANAGER; DOWNLOADS; APPLICATION; OFFICE; PROXY; WINACE; BROWSER; COMMANDER; UNDELETE; UTILITY; ADVANCED; ZONEALARM; PROTECTION; PROTECT; EDITOR; SYSTEM; NORTON; WINDOWS; ZIP; MAGIC; XP; NETWORK; REGISTRY; PROGRAM; PROGRAMS; UTILITIES; INTRANET; SAFE; SHIELD; STORAGE; Kryptel
|Cryptainer LE - http://www.cypherix.co.uk/cryptainerle/index.htm?source=tucows|
This is free 128-bit file and disk encryption software. It creates encrypted vaults for storing data. It supports drag-and-drop, and allows you to create secure e-mail files. With Cryptainer it is possible to encrypt files directly on any media, including removable media such as a USB Drive or CD-R. It works on all versions of Windows and with any type of data.
Keywords: Cryptainer LE; System and utilities; File tools; File encryption; ZONE ALARM; WIN ZIP; TINY FIREWALL; INTERNET SECURITY; HARD DISK; LOW LEVEL FORMAT; ENCRYPT; ENCRYPTION; MAGIC FOLDERS; CRYPT; PROTECTOR; LOCK; LOCKING; HIDE; REGISTRY CLEAN; DISK REPAIR; SSL; FDISK; PRIVATE; HIDDEN; HARDDRIVE; SECRET; SYSTEM; PARTITIONMAGIC; PROTECT; FOLDERS; MAGIC; DECODER; FOLDER; PARTITION MAGIC; WINDOWS COMMANDER; NORTON UTILITIES; PC ANYWHERE; DATA RECOVERY; PASSWORD RECOVERY; FILE TRANSFER; VIRTUAL DRIVE; PERSONAL FIREWALL; REMOTE ACCESS; REMOTE CONTROL; REMOTE ADMINISTRATOR; ZIP FILES; ZIP PROGRAM; FILE SHARING; WINDOWS XP; NORTON GHOST; WINRAR; PASSWORD; EMAIL; FILE RECOVERY; WIN RAR; EMAIL SERVER; REG CLEAN; BOOT DISK; DISK CLEANER; TOTAL COMMANDER; FIRE WALL; DISK IMAGE; EVIDENCE ELIMINATOR; HARD; DRIVERS; ENCODER; PGP; UNDELETE; REGISTRY CLEANER; SYSTEM MECHANIC; WS FTP LE; REG CLEANER; EMAIL CLIENT; VIRUS PROTECTION; BOOT MANAGER; WINDOWS 2000; FILE MANAGER; DRIVE IMAGE; DISK COPY; FIREWALL; VIRTUAL; REGISTRY; PARTITION; LEGAL; DECODERS; FILE; FILES; RECOVERY; SCANNER; FORMAT; TRUST; DECOMPILER; DECRYPTER; STORAGE; HARDDISK; HARD DRIVE; PORT SCANNER; VIRUS SCANNERS; DISK MANAGER; WINZIP; PC; MAIL; DATA; COMMANDER; COMANDER; EMULADOR; HD; SAFE; cryptainerpe; cryptainer pe